A Framework For Maximizing Traffic Monitoring Utility In Network V.Architha #1, Y.Nagendar *2
|
|
|
- Merilyn Beasley
- 9 years ago
- Views:
Transcription
1 A Framework For Maximizing Traffic Monitoring Utility In Network V.Architha #1, Y.Nagendar *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India *2 Assistant Professor, Department of CSE, SR Engineering College, Warangal, Andhra Pradesh, India Abstract--Monitoring network traffic has many important utilities that will help network personnel to safeguard interest of network. Monitoring will help in traffic engineering, forensics, troubleshooting, debugging and traffic accounting. Existing solutions to the problem of traffic monitoring focused on the placement of monitors across the network in order to maximize the utility of traffic monitoring. The monitors thus placed can provide optimal performance. However, the network experiences dynamic flows and measuring objectives might change from time to time. This will make the placement of same monitors suboptimal. Recently Raza et al. addressed this problem by using the concept of fixed monitors for routing traffic sub populations. This achieves efficient use of bandwidth, and improves Quality of Service (QoS) besides compliance with traffic engineering objectives. In this paper we implement a custom simulator to demonstrate the proof of concept. The empirical results revealed that the traffic monitoring approach is effective and can be used in real world networking applicaitons. Index Terms Routing, traffic monitoring, heterogeneous flows, traffic engineering I. INTRODUCTION In all kinds of networks monitoring is essential to analyze traffic flows and protect the network from attacks. Many works towards it are found in the literature. They focused on placement and configurations decisions of network monitors. Network has many measurement objectives and network exhibits certain characteristics. The optimal placement of network monitors plays an important role in achieving the best traffic engineering. The network monitors that observe traffic flows for long time may prove suboptimal as the measurement objectives and traffic characteristic might change over time thus making the monitors sub optimal. Traffic engineering concepts taking input as network flows and investigates monitor placement based on the traffic analysis were explored in [1], [2] and [3]. Similar to these a novel approach for network monitoring was proposed by Raza et al. [4]. Their solution to the problem is named MeasuRouting. This will forward network flows, which are dynamic in nature, to various routes where the traffic can be monitored in a best way. In other words, the MeasuRouting takes dynamic flows as input and considers monitoring activities based on the traffic flows keeping traffic characteristics and changing monitoring objectives in mind. MeasuRouting faces challenges like working in the given constraints and meeting the requirements of QoS. MeasuRouting can be used in various scenarios. For instance, it can be used when routers have uniform sampling implementation and the network operator has interest in traffic monitoring, the MeasuRouting can be used effectively. In this paper we implement the traffic monitoring framework proposed by Raza et al. [4]. We build a custom simulator prototype that can demonstrate the proof of concept. The empirical results are encouraging. The remainder of the paper is organized as follows. Section II reviews literature. Section III provides overview of the traffic monitoring framework. Section IV presents prototype implementation. Section V presents experimental results while section VI concludes the paper. II. PRIOR WORKS The prior work on network traffic monitoring is found in the literature. It focused on three aspects. First, observation of characteristics of actual traffic from sampled traffic. Second, investigating the effects of oblivious sampling on the monitoring abilities of network. Third, strategic placement of network monitors for optimal results. Various sampling approaches were explored in [5] at both time-based and packet-based granularities. More research was made on estimation of heavy-hitter traffic, traffic matrices and traffic, flow-size distributions and traffic volume[6], [7], [8], [9], [1], [11], [12], and [13]. Conventional sampling techniques were explored in [14] and anomaly detection algorithms were explored in [15]. Specific traffic sub populations [16] are the main focus of all these researches. Defining traffic sub population in flexible manner is done in [17] and [18]. All these ISSN: Page356
2 works focused on monitoring at one monitor while the work done by Raza et al. [4] focused on best use of all monitors and strategic deployment of monitors. The close researches to [4] include [19] and [2] as they strive to achieve coordination among multiple monitors to maximize the monitoring activity across the network. There are three problems solved by the proposed solutions. The first problem is known as Least TE Disruption Routing (LTD) which is formulated as follows. III. OVERVIEW OF PROPOSED FRAMEWORK The proposed approach is based on the work done in [4].The traffic monitoring needs Traffic Engineering (TE) policies. Within the confines of the policy, the proposed approach improves traffic monitoring utility in three different ways. 1. For aggregated flows generally TE policy is defined. For placement of traffic common intra-domain protocols such as IS-IS [21], OSPF 22] are used. Routing fine grained traffic sub populations without causing problems to aggregate routing. This concept is illustrated in fig. 1 (a) with four traffic flows. 2. The second way is influenced by TE objectives as they are oblivious to aggregate traffic and considers maximization summary metrics. This will violate the traffic characteristics and monitoring objectives. Fig. 1 (b) illustrates this approach. 3. In this approach it is allows to support violations to the specified level. There will be tradeoff between the TE policy and advantages. This concept is illustrated in Fig. 1 (c). The second problem is No Routing Loops Routing () where routing loops are not desirable for routing implementations in the real world. By restricting a set of links the loops are avoided. This is achieved using LTD with additional constraint as formulated below. The algorithm presented infig. 2 is used to find feasible routing for each flowset. Fig. 1 Three ways of enhancing traffic monitoring utility ISSN: Page3561
3 Fig.2- Algorithm to demonstrate multiple ways of constructing feasible routing (excerpt from [4]) The third problem is Relaxed Sticky Routes Routing (RSR). No routing loops are there in. However, it may not be feasible based on exact forwarding mechanisms. The RSR approach uses micro flowsets that are to be routed across a link which is not in the list of shorted paths. Thus RSR ensures that the micro flowset routing does not allow macro flowset traffic. This is achieved using LTD with some additional constraint as shown below. The three routing problems such as LTD, and RSR work with restrictions with different degrees. The LTD is flexible. However, it may result in loops. NLR does not allow loops but violation of routing semantics may take place. RSR overcomes the drawbacks of NLR and LTD. More information about these problems can be found in [4]. IV. PROTOTYPE IMPLEMENTATION We have implemented a prototype application which is nothing but our Customer Simulator to demonstrate the routing assisted traffic monitoring concept as proposed in [4]. We used Java platform for building the prototype. The environment used for the application development is a PC with 4GB RAM and Core 2 dual processing running Windows XP operating system. We used Net Beans IDE for rapid prototype building. V. EXPERIMENTAL RESUTLS For experiments certain parameters are considered. They are presented in table 1. We evaluated the proposed framework in terms of per flow performance gain with LTD,, and RSR. Experiments are also made with micro-flowsets and macro flowsets. Table 1 Experimental parameters (excerpt from [4]) As seen in table 1, four parameters are considered for experiments. They include flows for micro-flowset, micro-flowsets per macro-flowset, violation threshold of TE and micro-flowset sampling utility. The experimental results are presented below as a series of graphs plotted. F(x) Fig. 3 Illustrates per flow performance gain using LTD As can be seen in fig. 3, the cumulative distribution function of the per flow performance gain is presented. F(X) Fig. 4 Illustrates per flow performance gain using Per Flow Performance Gain(%) Per Flow Performance Gain(%) As can be seen in fig. 4, the cumulative distribution function of the per flow performance gain is presented. ISSN: Page3562
4 =Overall Performance Gain(%) Fig. 5 Performance of RSR and for different k As can be seen in fig. 5, the performance gain of RSR and for different k is almost same. The same trend is shown for all k values. = overall Performance gain(%) Fig. 6 Performance for different As can be seen infig. 6, performance of RSR and are increased as is increased. The horizontal axis represented value while the vertical axis represents overall performance gain. =Overall Performance Gain (%) K RSR Axis Title RSR NLR AS Axis Title RSR AS1221 NLR AS1221 RSR AS1239 Fig. 7 Performance for different networks As can be seen in fig. 7, performance proposed routing for different networks is presented. The overall performance gain is visualized for four different networks. The performance gains are more in case of AS Fig. 8 Performance for different micro-flowset assignments As can be seen in fig. 9, the performance gain of various micro-flowset assignments is presented. The reduced diversity in the sampling of micro-flowsets decreased the performance. VI. CONCLUSION In this paper we implement the network monitoring approach proposed by Raza et al. [4] for routing the network flows intelligently. This is achieved by placing monitors over network strategically. The proposed routing framework is governed by traffic characteristics of the network and monitoring objectives. Diversity in the network flows can be handled by the proposed framework. We built a custom simulator prototype to demonstrate the concept of routing assisted traffic monitoring. By intelligently placing monitors over network it will improve the routingperformance besides improving throughput and QoS. The experimental results revealed that the proposed framework is effective and can be used in real time network monitoring applications. REFERENCES RSR Ordered NLR Ordered RSR Random NLR Random [1] G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran, Reformulating the monitor placement problem: Optimal network-wide sampling, in Proceedings of ACM CoNEXT, 26. ISSN: Page3563
5 [2] K. Suh and Y. Guo and J. Kurose and D. Towsley, Locating network monitors: Complexity, heuristics and coverage, in Proceedings of IEEEINFOCOM, March 25. [3] C. Chaudet, E. Fleury, I. G. Lassous, H. Rivano, and M.-E. Voge, Optimal positioning of active and passive monitoring devices, in Proceedings of ACM CoNEXT, 25, pp [4] Saqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini Seetharaman and Jatinder Pal Singh, MeasuRouting: A Framework for Routing Assisted Traffic Monitoring, IEEE INFOCOM 21. [5] K. C. Claffy, G. C. Polyzos, and H.-W. Braun, Application of sampling methodologies to network traffic characterization, in Proceedings ofacm SIGCOMM, [6] B.-Y. Choi and S. Bhattacharyya, On the Accuracy and Overhead of Cisco Sampled NetFlow, in Proceedings of ACM SIGMETRICSWorkshop on Large Scale Network Inference (LSNI), June 25. [7] N. Duffield, C. Lund, and M. Thorup, Predicting Resource Usage and Estimation Accuracy in an IP Flow Measurement Collection Infrastructure, in Proceedings of ACM SIGCOMM, 23, pp [17] H. V. Madhyastha and B. Krishnamurthy, A Generic Language forapplication-specific Flow Sampling, ACM Computer CommunicationReview, vol. 38, no. 2, April 28. [18] L. Yuan, C.-N. Chuah, and P. Mohapatra, ProgME: Towards ProgrammableNetwork MEasurement, in Proceedings of ACM SIGCOMM,27. [19] M. R. Sharma and J. W. Byers, Scalable Coordination Techniques fordistributed Network Monitoring, in Proceedings of Passive and Activenetwork Measurement (PAM) workshop, April 25. [2] V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella,and D. G. Andersen, CSAMP: A System for Network- Wide FlowMonitoring, in Proceedings of USENIX NSDI, 28. [21] OSPF, April [22] IS-IS, February 199. AUTHORS [8] C. Estan, K. Keys, D. Moore, and G. Varghese, Building a Better NetFlow, in Proceedings of ACM SIGCOMM, 24. [9] C. Estan and G. Varghese, New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice, ACMTransactions on Computer Systems, vol. 21, no. 3, pp , August 23. [1] N. Hohn and D. Veitch, Inverting sampled traffic, in Proceedings of ACM SIGCOMM, 23. [11] R. Kompella and C. Estan, The Power of Slicing in Internet Flow Measurement, in Proceedings of ACM SIGCOMM, 25. V.Architha, She is pursuing M.Tech (CSE) in SR Engineering College, Warangal, AP, INDIA. She has received B.Tech degree in Information Technology. Her main research interest includes Networking [12] A. Kumar, M. Sung, J. Xu, and J. Wang, Data streaming algorithms for efficient and accurate estimation of flow size distribution, inproceedings of ACM SIGMETRICS, 24, pp [13] Y. Zhang, M. Roughan, C. Lund, and D. Donoho, An Information-Theoretic Approach to Traffic Matrix Estimation, in Proceedings ofacm SIGCOMM, 23, pp [14] X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina, Detection and Identification of Network AnomaliesUsing Sketch Subspaces, in Proceedings of ACM Internet MeasurementConference, 26. [15] J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang, Is sampled datasufficient for anomaly detection? in Proceedings of ACM IMC, 26. [16] A. Ramachandran, S. Seetharaman, N. Feamster, and V. Vazirani, FastMonitoring of Traffic Subpopulations, in Proceedings of ACM InternetMeasurement Conference, 28. Nagendar Yamsani received Master s degree in Computer Science and Engineering in 29 from Jawaharlal Nehru Technological University, Hyderabad, India. He is an Assistant Professor at the S R Engineering College, Warangal from 29 to till date. His research areas include Networks Security, Automata and Data Mining. ISSN: Page3564
LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement
LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement Chia-Wei Chang, Guanyao Huang, Bill Lin, Chen-Nee Chuah University of California, San Diego, University of California, Davis ABSTRACT
Solutions for Finding Network Traffic Measurements and Analysis
Solutions for Finding Network Traffic Measurements and Analysis T.Durga Prasad M.Tech Student, Department of CSE, Sree Rama institute of Technology and Science, Kuppenakuntla, Penuballi, Khammam,TS India.
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
Measurement-aware Monitor Placement and Routing
Measurement-aware Monitor Placement and Routing A Joint Optimization Approach for Network-Wide Measurements Guanyao Huang 1 Chia-Wei Chang Chen-Nee Chuah 1 Bill Lin 1 University of California at Davis,
Accessing Private Network via Firewall Based On Preset Threshold Value
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing
Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China [email protected] Bin Liu Tsinghua University Beijing, China [email protected]
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of
Automating Network Monitoring on Experimental Testbeds
Automating Network Monitoring on Experimental Testbeds Michael Golightly Princeton University [email protected] Jack Brassil HP Laboratories [email protected] Abstract Despite experimental testbeds
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
ISSN 2278-3091. Index Terms Cloud computing, outsourcing data, cloud storage security, public auditability
Outsourcing and Discovering Storage Inconsistencies in Cloud Through TPA Sumathi Karanam 1, GL Varaprasad 2 Student, Department of CSE, QIS College of Engineering and Technology, Ongole, AndhraPradesh,India
Revisiting the Issues On Netflow Sample and Export Performance
Revisiting the Issues On Netflow Sample and Export Performance Hamed Haddadi, Raul Landa, Andrew W. Moore, Saleem Bhatti, Miguel Rio and Xianhui Che University College London University of Cambridge University
An Efficient Algorithm for Measuring Medium- to Large-sized Flows in Network Traffic
An Efficient Algorithm for Measuring Medium- to Large-sized Flows in Network Traffic Ashwin Lall Georgia Inst. of Technology Mitsunori Ogihara University of Miami Jun (Jim) Xu Georgia Inst. of Technology
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
Disjoint Path Algorithm for Load Balancing in MPLS network
International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Traffic Engineering approaches using Multicriteria Optimization Techniques
Traffic Engineering approaches using Multicriteria Optimization Techniques Pedro Sousa, Paulo Cortez 3, Miguel Rio 2, Miguel Rocha Dept. of Informatics, University of Minho, Portugal, {pns,mrocha}@di.uminho.pt
Two Approaches to Internet Traffic Engineering for End-to-End Quality of Service Provisioning
Two Approaches to Internet Engineering for End-to-End Quality of Service Provisioning Kin-Hon Ho, Michael Howarth, Ning Wang, George Pavlou and Stylianos Georgoulas Centre for Communication Systems Research,
Dynamics of Prefix Usage at an Edge Router
Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, [email protected]}
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network
Bandwidth Sharing with Primary Paths for Protection Routing in an MPLS Network Faisal Aslam, Saqib Raza and Zartash Afzal Uzmi Department of Computer Science Lahore University of Management Sciences, Pakistan
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
Accurate Anomaly Detection using Adaptive Monitoring and Fast Switching in SDN
I.J. Information Technology and Computer Science, 2015, 11, 34-42 Published Online October 2015 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2015.11.05 Accurate Anomaly Detection using Adaptive
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
Towards Accurate Online Traffic Matrix Estimation in Software-Defined Networks
Towards Accurate Online Traffic Matrix Estimation in Software-Defined Networks ABSTRACT Yanlei Gong [email protected] Sheng Wang [email protected] Xiong Wang [email protected] Shizhong Xu [email protected]
Traffic Engineering in SDN/OSPF Hybrid Network
2014 IEEE 22nd International Conference on Network Protocols Traffic Engineering in SDN/OSPF Hybrid Network Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi,and Jianping Wu Department of Computer Science
Analysis of Effect of Handoff on Audio Streaming in VOIP Networks
Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* [email protected]
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
How To Monitor Network Traffic With Sflow Vswitch On A Vswitch
Living on the Edge: Monitoring Network Flows at the Edge in Cloud Data Centers Vijay Mann, Anilkumar Vishnoi, Sarvesh Bidkar IBM Research - India Email:{vijaymann,avishnoi}@in.ibm.com Indian Institute
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS
CREATING MINIMIZED DATA SETS BY USING HORIZONTAL AGGREGATIONS IN SQL FOR DATA MINING ANALYSIS Subbarao Jasti #1, Dr.D.Vasumathi *2 1 Student & Department of CS & JNTU, AP, India 2 Professor & Department
Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud
Content Distribution Scheme for Efficient and Interactive Video Streaming Using Cloud Pramod Kumar H N Post-Graduate Student (CSE), P.E.S College of Engineering, Mandya, India Abstract: Now days, more
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
Probability-Model based Network Traffic Matrix Estimation
Computer Science and Information Systems ():309 30 DOI: 0.98/CSIS3000T Probability-Model based Network Traffic Matrix Estimation Hui Tian, Yingpeng Sang, Hong Shen 3,4, and Chunyue Zhou School of Electronics
Load Balancing Mechanisms in Data Center Networks
Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic
Measuring the Shared Fate of IGP Engineering and Interdomain Traffic Sharad Agarwal Microsoft Research [email protected] Antonio Nucci Narus, Inc. [email protected] Supratik Bhattacharyya Sprint ATL
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
Efficiently Managing Firewall Conflicting Policies
Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks
CloudWatcher: Network Security Monitoring Using OpenFlow in Dynamic Cloud Networks (or: How to Provide Security Monitoring as a Service in Clouds?) Seungwon Shin SUCCESS Lab Texas A&M University Email:
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
An Adaptive MT-BGP Traffic Engineering Based on Virtual Routing Topologies
An Adaptive MT-BGP Traffic Engineering Based on Virtual Routing Topologies Dr.V. Palanisamy #1, K. Gowri *2 Head of the Department # Department of Computer Science and Engineering, Alagappa University
Self-Compressive Approach for Distributed System Monitoring
Self-Compressive Approach for Distributed System Monitoring Akshada T Bhondave Dr D.Y Patil COE Computer Department, Pune University, India Santoshkumar Biradar Assistant Prof. Dr D.Y Patil COE, Computer
International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE) ISSN: 0976-1353 Volume 8 Issue 1 APRIL 2014.
IMPROVING LINK UTILIZATION IN DATA CENTER NETWORK USING NEAR OPTIMAL TRAFFIC ENGINEERING TECHNIQUES L. Priyadharshini 1, S. Rajanarayanan, M.E (Ph.D) 2 1 Final Year M.E-CSE, 2 Assistant Professor 1&2 Selvam
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring
Detecting MAC Layer Misbehavior in Wifi Networks By Co-ordinated Sampling of Network Monitoring M.Shanthi 1, S.Suresh 2 Dept. of Computer Science and Engineering, Adhiyamaan college of Engineering, Hosur,
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Review of UNIVMON and Its Advantages
Enabling a RISC Approach for Software-Defined Monitoring using Universal Streaming Zaoxing Liu, Greg Vorsanger, Vladimir Braverman, Vyas Sekar Johns Hopkins University Carnegie Mellon University ABSTRACT
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
Efficient Parallel Distributed Load Balancing in Content Delivery Networks
Efficient Parallel Distributed Load Balancing in Content Delivery Networks P.Jyothi*1, N.Rajesh*2, K.Ramesh Babu*3 M.Tech Scholar, Dept of CSE, MRECW, Maisammaguda, Secunderabad, Telangana State, India,
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks
An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
